1 Opening(s)
6.0 Year(s) To 12.0 Year(s)
15.00 LPA TO 20.00 LPA
Title
Lead - Cloud Security consultant / SOC - Manager
Position Overview
The candidate will provide security technical expertise in Microsoft Azure and Microsoft 365. This role will be responsible for building and managing SOC strategy. Leading and managing the Security Operations and team of security operational staff.
Responsibilities
Configuration of products within MS365 EM+S ...
4 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Vertical - Information Security Management
Job Purpose-
Ability to learn, understand and work with team to gain insight into SOC and cyber forensic functions
Functional Responsibility
1.Perform Level1 SOC monitoring2. Timely escalation of incident if the same is not remediated within TAT3. Improve adherence to TAT over a period of time
Competencies Required-
1. Good understanding of network, ...
1 Opening(s)
6.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 18.00 LPA
About Augrade:At Augrade, our mission is to make AR/VR more accessible & adaptable to how we live, work & play. We’re a wearable tech startup working on AR glasses for Architectural firms, to help them think, work & present their work in 3D.
About the role:We are currently seeking a highly ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 8.00 LPA
Responsibilities:
Continuously monitor security alerts and events using various security information and event management (SIEM) tools.
Analyze network traffic, system logs, and other data sources to identify potential security incidents.
Investigate alerts to determine the root cause and severity of incidents.
Incident Response:
Respond promptly to security incidents, following established procedures and protocols.
Coordinate with other ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
8.00 LPA TO 14.00 LPA
Candidate would be responsible for carrying out the firmware development for various Electronic Embedded System based on Microcontroller or ARM Core associated with FPGA - SoC Modules. This would involve understanding schematic of Sensors based Electronic System, writing relevant device drivers, defining protocol for reading data and transferring data to ...
2 Opening(s)
6.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 12.00 LPA
DFT-SoC / Modem DFT for Smartphone ATPG Coverage analysis and improvementsAPTG/TFT pattern generation and optimizationCo-work with Smartphone SOC team to plan SoC/Modem DFT requirementsHandle pre-silicon DFT verification and post-silicon DFT debugDFT clocking and DFT timing constraintsDoing scan synthesis and scan-chain analysis/stitching etcDoing DCT/DCG synthesis.Analyze DFT timings violations along with STA teamsWork ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Splunk SIEM
Good to Have Skills : Security Information & Event Management (SIEM) Platform Management
Job Requirements : Role Title SOC Sr Security Analyst Support Tier Level 2 Career ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Splunk SIEM
Good to Have Skills : Security Information & Event Management (SIEM) Platform Operations
Job Requirements : Role Title SOC Sr Security Analyst Support Tier Level 2 Career ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Arcsight Security Information and Event Management
Good to Have Skills : Security Information & Event Management (SIEM) Platform Man agement
Job Requirements : Role Title SOC Sr Security Analyst ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively.
This position will require the candidate to be aligned ...